0
Your cart

Your cart is empty

Browse All departments
  • All departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All departments

Advances in Data and Web Management - Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009,... Advances in Data and Web Management - Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings (Paperback, 2009 ed.)
Qing Li, Ling Feng, Jian Pei, X.Sean Wang, Xiaofang Zhou, …
R2,742 R2,234 Discovery Miles 22 340 Save R508 (19%) Ships in 10 - 15 working days

This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009.

The 42 full papers presented together with 26 short papers and the abstracts of 2 keynote speeches were carefully reviewed and selected for inclusion in the book. The topics covered are query processing, topic-based techniques, Web data processing, multidimensional data analysis, stream data processing, data mining and its applications, and data management support to advanced applications.

Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008,... Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008, Proceedings (Paperback, 2008 ed.)
James Bailey, David Maier, Klaus-Dieter Schewe, Bernhard Thalheim, X.Sean Wang
R2,274 R1,949 Discovery Miles 19 490 Save R325 (14%) Ships in 10 - 15 working days

WISE 2008 was held in Auckland, New Zealand, during September 1-3, at The Auckland University ofTechnology City Campus Conference Centre. The aim of this conferencewasto providean internationalforum for researchers, professi- als, and industrial practitioners to share their knowledge in the rapidly growing area of Web technologies, methodologies, and applications. Previous WISE c- ferences wereheld in Hong Kong, China (2000), Kyoto, Japan (2001), Singapore (2002), Rome, Italy (2003), Brisbane, Australia (2004), New York, USA (2005), Wuhan, China (2006) and Nancy, France (2007). The call for papers created considerable interest. Around 110 paper s- missions were received and the international Program Committee selected 31 papers out of the 110 submissions (an acceptance rate of 28. 2%). Of these, 17 papers were chosen for standard presentation and the remaining 14 papers for short presentation. The authors of the accepted papers range across 13 co- tries: Australia, China, Germany, Greece, Italy, Japan, Korea, New Zealand, Poland, Singapore, Spain, Switzerland and the USA. The technical track of the WISE 2008 program o?ered nine paper presentation sessions. The selected - pers covered a wide and important variety of issues in Web information systems engineering such as querying; search; ranking; trust; peer-to-peer networks; - formation ?ltering; information integration; agents and mining. A few selected papers from WISE 2008 will be published in a special issue of the World Wide Web Journal, bySpringer. Inaddition, a $1000prizewasawardedto the authors ofthepaperselectedforthe"YahikoKambayashiBestPaperAward. "Wethank all authors who submitted their papers and the Program Committee members andexternalreviewersfor their excellent work.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,787 R2,623 Discovery Miles 26 230 Save R164 (6%) Ships in 10 - 15 working days

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,150 Discovery Miles 31 500 Ships in 7 - 11 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,314 Discovery Miles 23 140 Ships in 7 - 11 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012,... Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012, Proceedings (Paperback, 2012 ed.)
X.Sean Wang, Isabel Cruz, Alex Delis, Guangyan Huang
R2,596 Discovery Miles 25 960 Ships in 7 - 11 working days

This book constitutes the proceedings of the 13th International Conference on Web Information Systems Engineering, WISE 2012, held in Paphos, Cyprus, in November 2012. The 44 full papers, 13 short papers, 9 demonstrations papers and 9 "challenge" papers were carefully reviewed and selected from 194 submissions. The papers cover various topics in the field of Web Information Systems Engineering.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,263 Discovery Miles 32 630 Ships in 7 - 11 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R3,137 Discovery Miles 31 370 Ships in 7 - 11 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Advances in Web-Age Information Management - Second International Conference, WAIM 2001, Xi'an, China, July 9-11, 2001.... Advances in Web-Age Information Management - Second International Conference, WAIM 2001, Xi'an, China, July 9-11, 2001. Proceedings (Paperback, 2001 ed.)
X.Sean Wang, Ge Yu, Hongjun Lu
R2,377 Discovery Miles 23 770 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the Second International Conference on Web-Age Information Management, WAIM 2001, held in Xi'an, China, in July 2001.The 21 revised full papers and 12 short papers presented together with 4 research experience papers were carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections on multimedia databases and high-dimensional indexing, information retrieval and text indexing, data mining, semistructured data management, data warehousing and federated databases, Web information management and e-commerce, spatio-temporal and high-dimensional information management, data mining and constraint management, data integration and filtering, and workflow and adaptive systems.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Hardcover, 2006 ed.)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R3,372 Discovery Miles 33 720 Ships in 7 - 11 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Dallas, TX, USA, April 16-19, 2016,... Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Dallas, TX, USA, April 16-19, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Shamkant B. Navathe, Weili Wu, Shashi Shekhar, Xiaoyong Du, X.Sean Wang, …
R1,949 Discovery Miles 19 490 Ships in 7 - 11 working days

This two volume set LNCS 9642 and LNCS 9643 constitutes the refereed proceedings of the 21st International Conference on Database Systems for Advanced Applications, DASFAA 2016, held in Dallas, TX, USA, in April 2016. The 61 full papers presented were carefully reviewed and selected from a total of 183 submissions. The papers cover the following topics: crowdsourcing, data quality, entity identification, data mining and machine learning, recommendation, semantics computing and knowledge base, textual data, social networks, complex queries, similarity computing, graph databases, and miscellaneous, advanced applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Simply Child Hot Air Balloon Mobile…
R390 Discovery Miles 3 900
Loot
Nadine Gordimer Paperback  (2)
R336 R283 Discovery Miles 2 830
Loot
Nadine Gordimer Paperback  (2)
R336 R283 Discovery Miles 2 830
Canon PG-445XL High-Yield Inkjet…
 (12)
R363 Discovery Miles 3 630
Elizabeth Arden Sunflowers Summer Air…
 (4)
R560 R279 Discovery Miles 2 790
Green Book
Viggo Mortensen, Mahershala Ali, … Blu-ray disc  (1)
R251 Discovery Miles 2 510
Casio LW-200-7AV Watch with 10-Year…
R899 R765 Discovery Miles 7 650
Jeronimo Mermaid Doll Set (Supplied May…
R229 R109 Discovery Miles 1 090
Loot
Nadine Gordimer Paperback  (2)
R336 R283 Discovery Miles 2 830
Funko Pint Size Heroes: Guardians of The…
R99 R59 Discovery Miles 590

 

Partners